|Tuesday||11:30 AM - 1:30 PM||lesson||Lecture Hall F|
|Wednesday||2:30 PM - 4:30 PM||lesson||Lecture Hall I|
The goal is to reach a deep comprehension and development ability in program analysis and protection. The application area concerns the development of tools for analysis an code certification, reverse engineering of code, digital forensics and code protection against theft (IPP). Particular emphasis is devoted to code protection by code obfuscation, watermarking, tamper-proofing and code attack by malware.
Mathematical bases: Lattice theory and Fixpoint theory; Attack and defense: Attack, Data Flow Analysis, Static Attack, Dynamic Attack, Program Monitoring, Levels of interpretation and specialization, Code Slicing; Approximation: fix point approximation, Abstract Interpretation, Completeness, incompleteness and obfuscation; Obfuscation theory: impossibility and obfuscation via interpretation, Static Obfuscation and Dynamic Obfuscation; Tamper-proofing; Watermarking: definitions (water/birth/finger marking), Static Watermarking, Dynamic Watermarking, Abstract Watermarking; Similarity analysis, Law references and principles of digital forensics.
Cooperative project in SPY-Lab on code analysis and/or protection. The exams are 4, scheduled 1 in each Session, each individual exam scheduled by appointment with the teacher.
|Outcomes Exams||Outcomes Percentages||Average||Standard Deviation|
|18||19||20||21||22||23||24||25||26||27||28||29||30||30 e Lode|
Data from AA 2014/2015 based on 16 students. I valori in percentuale sono arrotondati al numero intero più vicino.